Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24250: A malicious app acting as a HTTPS proxy could get access to sensitive user data in Apple macOS

0
Critical
VulnerabilityCVE-2025-24250cvecve-2025-24250
Published: Mon Mar 31 2025 (03/31/2025, 22:23:17 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

This issue was addressed with improved access restrictions. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5. A malicious app acting as a HTTPS proxy could get access to sensitive user data.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 00:57:21 UTC

Technical Analysis

CVE-2025-24250 is a critical security vulnerability identified in Apple macOS operating systems, where a malicious application can masquerade as an HTTPS proxy to intercept and access sensitive user data. This vulnerability arises from insufficient access restrictions that allow unauthorized applications to act as HTTPS proxies, thereby bypassing normal security controls designed to protect encrypted communications. The flaw is categorized under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). Exploitation requires no privileges (AV:N/AC:L/PR:N/UI:N) and can be performed remotely without user interaction, making it highly accessible to attackers. The vulnerability affects macOS versions prior to Sequoia 15.4, Sonoma 14.7.5, and Ventura 13.7.5, where Apple has implemented improved access restrictions to address the issue. The CVSS v3.1 base score of 9.8 reflects the critical nature of this vulnerability, with high impact on confidentiality, integrity, and availability. While no active exploits have been reported, the potential for data leakage through interception of HTTPS traffic poses a significant risk to user privacy and organizational security. The vulnerability could be leveraged to steal credentials, sensitive communications, or other confidential information transmitted over HTTPS connections.

Potential Impact

The impact of CVE-2025-24250 is substantial for organizations worldwide, especially those relying heavily on macOS devices for sensitive operations. Successful exploitation can lead to unauthorized disclosure of confidential user data, including credentials, personal information, and corporate secrets transmitted over HTTPS. This compromises confidentiality and may also affect data integrity if attackers manipulate intercepted data. The availability of systems could be indirectly impacted if trust in secure communications is undermined, leading to operational disruptions. Enterprises in sectors such as finance, healthcare, government, and technology are particularly vulnerable due to the sensitive nature of their data and reliance on secure communications. The ease of exploitation without authentication or user interaction increases the likelihood of widespread attacks once exploits become available. Additionally, the vulnerability could facilitate advanced persistent threats (APTs) by enabling stealthy data exfiltration. Organizations failing to apply patches risk significant data breaches, regulatory penalties, and reputational damage.

Mitigation Recommendations

To mitigate CVE-2025-24250, organizations should immediately deploy the security updates released by Apple in macOS Sequoia 15.4, Sonoma 14.7.5, and Ventura 13.7.5. Beyond patching, organizations should implement application whitelisting to prevent unauthorized apps from installing or running as HTTPS proxies. Network monitoring should be enhanced to detect unusual proxy activity or unauthorized interception of HTTPS traffic. Employ endpoint detection and response (EDR) solutions capable of identifying suspicious proxy behaviors. Enforce strict code signing and app notarization policies to reduce the risk of malicious apps being installed. Educate users about the risks of installing untrusted software and encourage the use of VPNs or additional encryption layers where feasible. Regularly audit macOS systems for unauthorized proxy configurations and review system logs for anomalies. Finally, maintain a robust incident response plan to quickly address any suspected exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-01-17T00:00:45.010Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091e14c28fd46ded869647

Added to database: 11/3/2025, 9:26:44 PM

Last enriched: 4/3/2026, 12:57:21 AM

Last updated: 5/9/2026, 8:44:01 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses